Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 15:02
Behavioral task
behavioral1
Sample
Nincsmegerstve50667.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
Nincsmegerstve50667.exe
-
Size
75KB
-
MD5
9fb584a7f293aa900e682cabe3faefcc
-
SHA1
043d316155bf973a2bb8f1d4ed29c2db7568854b
-
SHA256
22adf85ad4591d2c4871440fe7ed023575be15e202ca0abe54c17c77cddca990
-
SHA512
5c77d9d656357416b0663b437104702fcc3060ec1612726d07ee557b74f0c845725435a69c8090c20f6410e6ef4899d1347f201365b493a7ed739b9057b20b5a
-
SSDEEP
1536:GuIFQo65XTfSBtcLuJ5Hp+b5oFN7aS4V2EOOo/Z3VI8Ev:GuxJYL+b5z1OO2Z3VInv
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2036-1-0x0000000001140000-0x000000000115A000-memory.dmp family_xworm -
Xworm family
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 Nincsmegerstve50667.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 Nincsmegerstve50667.exe Token: SeDebugPrivilege 2036 Nincsmegerstve50667.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 Nincsmegerstve50667.exe